/system/extras/simpleperf/ |
H A D | callchain.h | 28 std::vector<SampleEntry*> chain; member in struct:CallChainNode
|
H A D | callchain.cpp | 31 const std::vector<SampleEntry*>& chain, size_t chain_start) { 33 for (i = 0, j = chain_start; i < node->chain.size() && j < chain.size(); ++i, ++j) { 34 if (!MatchSampleByName(node->chain[i], chain[j])) { 44 if (MatchSampleByName(node->chain.front(), sample)) { 51 static std::unique_ptr<CallChainNode> AllocateNode(const std::vector<SampleEntry*>& chain, argument 55 for (size_t i = chain_start; i < chain.size(); ++i) { 56 node->chain.push_back(chain[ 30 GetMatchingLengthInNode(const CallChainNode* node, const std::vector<SampleEntry*>& chain, size_t chain_start) argument [all...] |
/system/keymaster/ |
H A D | android_keymaster_messages_test.cpp | 568 keymaster_cert_chain_t* chain = &deserialized->certificate_chain; local 570 EXPECT_NE(nullptr, chain->entries); 571 EXPECT_EQ(3U, chain->entry_count); 572 EXPECT_EQ(3U, chain->entries[0].data_length); 573 EXPECT_EQ(0, memcmp("foo", chain->entries[0].data, 3)); 574 EXPECT_EQ(3U, chain->entries[1].data_length); 575 EXPECT_EQ(0, memcmp("bar", chain->entries[1].data, 3)); 576 EXPECT_EQ(3U, chain->entries[2].data_length); 577 EXPECT_EQ(0, memcmp("baz", chain->entries[2].data, 3));
|
H A D | asymmetric_key.cpp | 221 static bool allocate_cert_chain(size_t entry_count, keymaster_cert_chain_t* chain, argument 223 if (chain->entries) { 224 for (size_t i = 0; i < chain->entry_count; ++i) 225 delete[] chain->entries[i].data; 226 delete[] chain->entries; 229 chain->entry_count = entry_count; 230 chain->entries = new keymaster_blob_t[entry_count]; 231 if (!chain->entries) { 238 // Copies the intermediate and root certificates into chain, leaving the first slot for the leaf 242 keymaster_cert_chain_t* chain, keymaster_error_ 240 copy_attestation_chain(const KeymasterContext& context, keymaster_algorithm_t sign_algorithm, keymaster_cert_chain_t* chain, keymaster_error_t* error) argument [all...] |
H A D | android_keymaster_test.cpp | 3498 static bool verify_chain(const keymaster_cert_chain_t& chain) { argument 3499 for (size_t i = 0; i < chain.entry_count - 1; ++i) { 3500 keymaster_blob_t& key_cert_blob = chain.entries[i]; 3501 keymaster_blob_t& signing_cert_blob = chain.entries[i + 1];
|
/system/netd/server/ |
H A D | FirewallController.cpp | 48 // fw_dozable chain is called from both INPUT and OUTPUT, this includes both packets that we need 111 int FirewallController::enableChildChains(ChildChain chain, bool enable) { argument 114 switch(chain) { 224 FirewallType FirewallController::getFirewallType(ChildChain chain) { argument 225 switch(chain) { 239 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument 245 FirewallType firewallType = getFirewallType(chain); 257 switch(chain) { 277 ALOGW("Unknown child chain: %d", chain); [all...] |
H A D | BandwidthController.cpp | 84 * - quota'd rules in the costly chain should be before bw_penalty_box lookups. 88 * - global quota for all costly interfaces uses a single costly chain: 330 std::string BandwidthController::makeIptablesSpecialAppCmd(IptOp op, int uid, const char *chain) { argument 340 ALOGE("Append op not supported for %s uids", chain); 352 asprintf(&buff, "%s %s -m owner --uid-owner %d", opFlag, chain, uid); 384 const char *chain, 411 ALOGE(failLogTemplate, appStrUids[uidNum], appUids[uidNum], chain); 419 iptCmd = makeIptablesSpecialAppCmd(op, uid, chain); 421 ALOGE(failLogTemplate, appStrUids[uidNum], uid, chain); 429 iptCmd = makeIptablesSpecialAppCmd(IptOpDelete, appUids[uidNum], chain); 383 manipulateSpecialApps(int numUids, char *appStrUids[], const char *chain, IptJumpOp jumpHandling, SpecialAppOp appOp) argument [all...] |
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 102 keymaster_cert_chain_t chain; member in struct:android::KeymasterCertificateChain
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 212 memset(&chain, 0, sizeof(chain)); 216 keymaster_free_cert_chain(&chain); 244 keymaster_free_cert_chain(&chain); 252 chain.entries = reinterpret_cast<keymaster_blob_t*>(malloc(sizeof(keymaster_blob_t) * ucount)); 253 if (!chain.entries) { 254 ALOGE("Error allocating memory for certificate chain"); 258 memset(chain.entries, 0, sizeof(keymaster_blob_t) * ucount); 260 if (!readKeymasterBlob(in, &chain.entries[i])) { 262 keymaster_free_cert_chain(&chain); 1856 KeymasterCertificateChain chain; local [all...] |